Back to Infisical

Google SAML

docs/documentation/platform/sso/google-saml.mdx

0.159.257.5 KB
Original Source
<Info> Google SAML SSO feature is a paid feature. If you're using Infisical Cloud, then it is available under the **Pro Tier**. If you're self-hosting Infisical, then you should contact [email protected] to purchase an enterprise license to use it. </Info> <Note> SSO authentication requires [Email Domain Verification](/documentation/platform/email-domain). You must verify your organization's email domain before users can log in via SSO. </Note> <Steps> <Step title="Prepare the SAML SSO configuration in Infisical"> In Infisical, head to the **Single Sign-On (SSO)** page and select the **General** tab. Click **Connect** for **SAML** under the Connect to an Identity Provider section. Select **Google**, then click **Connect** again.
    ![SSO connect section](../../../images/sso/connect-saml.png)

    Next, note the **ACS URL** and **SP Entity ID** to use when configuring the Google SAML application.

    ![Google SAML initial configuration](../../../images/sso/google-saml/init-config.png)
</Step> <Step title="Create a SAML application in Google"> 2.1. In your [Google Admin console](https://support.google.com/a/answer/182076), head to Menu > Apps > Web and mobile apps and create a **custom SAML app**.
    ![Google SAML app creation](../../../images/sso/google-saml/create-custom-saml-app.png)

    2.2. In the **App details** tab, give the application a unique name like Infisical.

    ![Google SAML app naming](../../../images/sso/google-saml/name-custom-saml-app.png)

    2.3. In the **Google Identity Provider details** tab, copy the **SSO URL**, **Entity ID** and **Certificate**.

    ![Google SAML custom app details](../../../images/sso/google-saml/custom-saml-app-config.png)

    2.4. Back in Infisical, set **SSO URL** and **Certificate** to the corresponding items from step 2.3.

    ![Google SAML Infisical config](../../../images/sso/google-saml/infisical-config.png)

    2.5. Back in the Google Admin console, in the **Service provider details** tab, set the **ACS URL** and **Entity ID** to the corresponding items from step 1.

    Also, check the **Signed response** checkbox.

    ![Google SAML app config 2](../../../images/sso/google-saml/custom-saml-app-config-2.png)

    2.6. In the **Attribute mapping** tab, configure the following map:

    - **First name** -> **firstName**
    - **Last name** -> **lastName**
    - **Primary email** -> **email**

    ![Google SAML attribute mapping](../../../images/sso/google-saml/attribute-mapping.png)

    <Note>
    If you want to sync Google groups to Infisical groups, you can also configure:
    - **groups** -> **groups**

    This requires setting up group claims in Google Workspace. See the [Group Membership Mapping](#saml-group-membership-mapping) section below for details.
    </Note>

    Click **Finish**.
</Step>
<Step title="Assign users in Google Workspace to the application">
    Back in your [Google Admin console](https://support.google.com/a/answer/182076), head to Menu > Apps > Web and mobile apps > your SAML app
    and press on **User access**.

    ![Google SAML user access](../../../images/sso/google-saml/user-access.png)

    To assign everyone in your organization to the application, click **On for everyone** or **Off for everyone** and then click **Save**.

    You can also assign an organizational unit or set of users to an application; you can learn more about that [here](https://support.google.com/a/answer/6087519?hl=en#add_custom_saml&turn_on&verify_sso&&zippy=%2Cstep-add-the-custom-saml-app%2Cstep-turn-on-your-saml-app%2Cstep-verify-that-sso-is-working-with-your-custom-app).

    ![Google SAML user access assignment](../../../images/sso/google-saml/user-access-assign.png)
</Step>
<Step title="Enable SAML SSO in Infisical">
    Enabling SAML SSO allows members in your organization to log into Infisical via Google Workspace.

    ![Google SAML enable](../../../images/sso/google-saml/enable-saml.png)
</Step>
<Step title="Enforce SAML SSO in Infisical">
    Enforcing SAML SSO ensures that members in your organization can only access Infisical
    by logging into the organization via Google.

    To enforce SAML SSO, you're required to test out the SAML connection by successfully authenticating at least one Google user with Infisical;
    Once you've completed this requirement, you can toggle the **Enforce SAML SSO** button to enforce SAML SSO.

    <Warning>
        We recommend ensuring that your account is provisioned the application in Google
        prior to enforcing SAML SSO to prevent any unintended issues.
    </Warning>
    <Info>
        In case of a lockout, an organization admin can use the [Admin Login Portal](https://infisical.com/docs/documentation/platform/sso/overview#admin-login-portal) in the `/login/admin` path e.g. https://app.infisical.com/login/admin.
    </Info>
</Step>
</Steps>

SAML Group Membership Mapping

Automatically sync Google Workspace group memberships to Infisical.

<Steps> <Step title="Add groups attribute mapping in Google"> In your Google Admin console SAML app, go to **Attribute mapping** and add:
    - **Google groups**: Include all groups you want to include in the SAML claim. Only these groups will be synced to Infisical.
    - **App attribute**: `groups`

    ![Google SAML groups attribute mapping](../../../images/sso/google-saml/groups-attribute-mapping.png)

</Step>
<Step title="Enable SAML Group Membership Mapping in Infisical">
    Back in Infisical, under Organization Settings, enable **SAML Group Membership Mapping** in the **Single Sign-On (SSO)** tab.

    ![Google SAML group membership mapping](../../../images/sso/google-saml/group-membership-mapping.png)
</Step>
<Step title="Group synchronization on login">
    Once configured, Google groups will now be automatically synchronized when users log in through SAML. Users will be added to or removed from Infisical groups based on their current Google group memberships.
</Step>
</Steps> <Warning> Group membership changes in the SAML provider only sync with Infisical when a user logs in via SAML. For example, if you remove a user from a group in the SAML provider, this change will not be reflected in Infisical until their next SAML login. To ensure this behavior, Infisical recommends enabling Enforce SAML SSO. </Warning> <Tip> If you are only using one organization on your Infisical instance, you can configure a default organization in the [Server Admin Console](../admin-panel/server-admin#default-organization) to expedite SAML login. </Tip> <Note> If you're configuring SAML SSO on a self-hosted instance of Infisical, make sure to set the `AUTH_SECRET` and `SITE_URL` environment variable for it to work: <div class="height:1px;"/> - `AUTH_SECRET`: A secret key used for signing and verifying JWT. This can be a random 32-byte base64 string generated with `openssl rand -base64 32`. <div class="height:1px;"/> - `SITE_URL`: The absolute URL of your self-hosted instance of Infisical including the protocol (e.g. https://app.infisical.com) </Note>

References: